Search results for: security critical application
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14809

Search results for: security critical application

13579 Separation of Powers and Judicial Review vis-a-vis Judicial Overreach in South Africa: A Critical Analysis

Authors: Linda Muswaka

Abstract:

The Constitution of the Republic of South Africa, 1996 ranks the Constitution as the Supreme law of the Republic. Law or conduct, inconsistent with the provisions of the Constitution is invalid to the extent of the inconsistency. The Constitution binds all persons and legislative, executive and judicial organs of the State at all levels of government. The Constitution embodies a Bill of Rights and expressly allows for judicial review. The introduction of a chapter of rights requires the judiciary to examine the decisions of the legislature and the executive. In a situation where these conflicts with the Bill of Rights, the judiciary have the constitutional power to overrule such decisions. In exercising its adjudicatory and interpretative powers, the judiciary sometimes arrives at unpopular decisions and accusations of judicial overreach are made. A problem, therefore, emerges on the issue of the separation of powers and judicial review. This paper proposes to, through the South African perspective, investigate the application of the doctrine of separation of powers and judicial review. In this regard, the qualitative method of research will be employed. The reason is that it is best suited to this type of study which entails a critical analysis of legal issues. The following findings are made: (i) a complete separation of powers is not possible. This is because some overlapping of the functions of the three branches of state are unavoidable; (ii) the powers vested in the judiciary does not make it more powerful than the executive and the legislature; (iii) interference by the judiciary in matters concerning other branches is not automatically, judicial overreach; and (iv) if both the executive and legislative organs of government adhere to their constitutional obligations there would be a decrease in the need for judicial interference through court adjudication. The researcher concludes by submitting that the judiciary should not derogate from their constitutionally mandated function of judicial review. The rationale being that that if the values contained in the Constitution are not scrupulously observed and their precepts not carried out conscientiously, the result will be a constitutional crisis of great magnitude.

Keywords: constitution, judicial review, judicial overreach, separation of powers

Procedia PDF Downloads 196
13578 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han

Abstract:

As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.

Keywords: actuator, user authentication, security evaluation, haptic actuator

Procedia PDF Downloads 332
13577 World on the Edge: Migration and Cross Border Crimes in West Africa

Authors: Adeyemi Kamil Hamzah

Abstract:

The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.

Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation

Procedia PDF Downloads 210
13576 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment

Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

Abstract:

In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.

Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment

Procedia PDF Downloads 161
13575 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security

Authors: Carmen J. Savelli, Romy Conzade

Abstract:

Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.

Keywords: food safety, food security, nutrition, policy

Procedia PDF Downloads 397
13574 Development of Performance Measures for the Implementation of Total Quality Management in Indian Industry

Authors: Perminderjit Singh, Sukhvir Singh

Abstract:

Total Quality Management (TQM) refers to management methods used to enhance quality and productivity in business organizations. Total Quality Management (TQM) has become a frequently used term in discussions concerning quality. Total Quality management has brought rise in demands on the organizations policy and the customers have gained more importance in the organizations focus. TQM is considered as an important management tool, which helps the organizations to satisfy their customers. In present research critical success factors includes management commitment, customer satisfaction, continuous improvement, work culture and environment, supplier quality management, training and development, employee satisfaction and product/process design are studied. A questionnaire is developed to implement these critical success factors in implementation of total quality management in Indian industry. Questionnaires filled by consulting different industrial organizations. Data collected from questionnaires is analyzed by descriptive and importance indexes.

Keywords: total quality management, critical success factor, employee satisfaction, supplier quality management, customer focus, quality information, quality measurement

Procedia PDF Downloads 459
13573 Science Process Skill and Interest Preschooler in Learning Early Science through Mobile Application

Authors: Seah Siok Peh, Hashimah Mohd Yunus, Nor Hashimah Hashim, Mariam Mohamad

Abstract:

A country needs a workforce that encompasses knowledge, skilled labourers to generate innovation, productivity and being able to solve problems creatively via technology. Science education experts believe that the mastery of science skills help preschoolers to generate such knowledge on scientific concepts by providing constructive experiences. Science process skills are skills used by scientists to study or investigate a problem, issue, problem or phenomenon of science. In line with the skills used by scientists. The purpose of this study is to investigate the basic science process skill and interest in learning early science through mobile application. This study aimed to explore six spesific basic science process skills by the use of a mobile application as a learning support tool. The descriptive design also discusses on the extent of the use of mobile application in improving basic science process skill in young children. This study consists of six preschoolers and two preschool teachers from two different classes located in Perak, Malaysia. Techniques of data collection are inclusive of observations, interviews and document analysis. This study will be useful to provide information and give real phenomena to policy makers especially Ministry of education in Malaysia.

Keywords: science education, basic science process skill, interest, early science, mobile application

Procedia PDF Downloads 231
13572 Information Technology (IT) Outsourcing and the Challenges of Implementation in Financial Industries: A Case Study of Guarantee Trust Assurance PLC

Authors: Salim Ahmad, Ahamed Sani Kazaure, Haruna Musa

Abstract:

Outsourcing had been the contractual relationship in which the responsibility for a function or task is handed over to an outside firm for a fixed period of time which is not the same as contracting where a specific one-off task is allocated to an external business; therefore in information technology a specialist area such as maintenance of web servers is controlled by an outside firm or if the department is not a critical factor the whole IT section may be outsourced. Organisation contracts is frequently a major area in successful outsourcing relationship, whereby the contracts specify the right, liability and expectation of the vendor and contracts are mostly of high value and last for very long. Therefore, in this research one particular project that is been outsourced for the financial industry (Guarantee Trust Assurance PlC) is been discussed along with the approach used and the various problems encountered, though Outsourcing is not necessarily a perfect and easy way out for business. It is extremely critical for a company to look at all the aspect of outsourcing before deciding to use it as an instrument for development. Moreover, critical analysis of the management issues encountered while implementing the outsourcing project have been fully discussed in the paper.

Keywords: outsourcing, techniques used in outsourcing, challenges of outsourcing implementation, management issues during implementation of outsourcing project

Procedia PDF Downloads 359
13571 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farming as Web of Things to Cloud Interface Using Platform as a Service

Authors: Sumaya Iqbal, Aijaz Ahmad Reshi

Abstract:

The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made the resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular Representational State Transfer protocol (REST) was extended for the specific requirements of the application. Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.

Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway

Procedia PDF Downloads 105
13570 Determinants of International Volatility Passthroughs of Agricultural Commodities: A Panel Analysis of Developing Countries

Authors: Tetsuji Tanaka, Jin Guo

Abstract:

The extant literature has not succeeded in uncovering the common determinants of price volatility transmissions of agricultural commodities from international to local markets, and further, has rarely investigated the role of self-sufficiency measures in the context of national food security. We analyzed various factors to determine the degree of price volatility transmissions of wheat, rice, and maize between world and domestic markets using GARCH models with dynamic conditional correlation (DCC) specifications and panel-feasible generalized least square models. We found that the grain autarky system has the potential to diminish volatility pass-throughs for three grain commodities. Furthermore, it was discovered that the substitutive commodity consumption behavior between maize and wheat buffers the volatility transmissions of both, but rice does not function as a transmission-relieving element, either for the volatilities of wheat or maize. The effectiveness of grain consumption substitution to insulate the pass-throughs from global markets is greater than that of cereal self-sufficiency. These implications are extremely beneficial for developing governments to protect their domestic food markets from uncertainty in foreign countries and as such, improves food security.

Keywords: food security, GARCH, grain self-sufficiency, volatility transmission

Procedia PDF Downloads 139
13569 The 'Currency' of Dolus Eventualis Considered during Sentencing for Murder

Authors: Reuben Govender

Abstract:

Culpability is an essential element for an accused to be held liable for a crime. The mental element or mens rea determines blameworthiness of an accused on a charge of killing a person. The mens rea required for a conviction of murder is intent while culpable homicide requires negligence. Central to blameworthiness in mens rea is individual freedom and voluntariness. The test for intent is subjective and objective for negligence. This paper presents a review of dolus eventualis in the context of murder trials and from a South African perspective. This paper poses a central questions namely, is dolus eventualis a ‘weaker currency’ during sentencing for murder? This paper attempts to answer this question by reviewing the concept of dolus eventualis, the test in judicial application, a review of decided South African cases in its application, its incorrect application and finally, considerations for its correct application. Lastly, the ‘weight’ of a dolus eventualis conviction in terms of sentencing will be reviewed to support the central question which is answered in the negative.

Keywords: dolus eventualis, dolus indeterminatus, dolus generalis, mens rea

Procedia PDF Downloads 221
13568 Negotiated Peace in Africa: A Case Study on the Pretoria Peace Deal between Federal Democratic Republic of Ethiopia and Tigray Peoples Liberation Front

Authors: Daniel Gidey, Kunwar Siddarth Dadhwal, Tagel Wondimu

Abstract:

There are numerous ways for ending conflict; hitherto, most conflicts are resolved either through negotiated or victor's peace, this article is about the former. Negotiations entail concessions, consensus-building, and mutual trust in order to transform a belligerent situation into a settlement. In such a context, regional and sub-regional organizations play a critical role in mediating conflicting parties so as to prevent, manage, and resolve conflicts between and among conflicting parties. This article is about the AU-led negotiated peace deal on the bloody conflict between the Tigray Peoples Liberation Front (TPLF) and the Federal Democratic Republic of Ethiopia (FDRE) by undertaking the Pretoria Peace Accord as a case study. In terms of research method, the article is based on a critical evaluation of the literature and content analysis on the very research topic. Findings of the study revealed that the AU, through Olusegun Obasanjo and other dignitaries, played a critical role in nurturing compromise and mutual trust between the TPLF and the Ethiopian federal government so as to take along the Pretoria peace deal. Through critical literature review and content analysis of the Peace deal, the article has concluded that negotiated peace is likely, at least, to achieve negative peace.

Keywords: regional organizations, peace promotion, African Union, negotiating conflicts, Northern Ethiopia, conflict resolution

Procedia PDF Downloads 58
13567 Climate Change and Human Migration

Authors: Sungwoo Park

Abstract:

The paper attempts to investigate the correlation between climate change and migration that has caused violent disputes in some regions of the world. Recently, NGOs and educational institutions have proposed claims that migratory patterns and violent uprisings are intertwined with climate change. Thus, the paper is primarily concerned with collecting evidences provided from scholars, validating this significant connection between climate change and migration, and evaluating and suggesting current and future research approaches respectively to enhance the acknowledgment and protection of environmental refugees. In order to examine the linkage of environmental migration, primary sources, such as political speeches, and secondary sources like theses from environmental policy analysts, books, and reports are used. More specifically, the investigation focuses on an civil war in Syria to draw a connection between environmental migration and violent dispute that threatens the global security. The examination undertaken specifically analyzes examples where forced migration occurred due to climate change. In Bangladesh, Pakistan, and Kiribati, residents have been at risk of fleeing their countries because of abnormal climate patterns, such as the rise of sea level or an excessive heat stress. As the brutal uprising in Syria has proven that climate change can pose a significant threat to global security, correlation between climate change and migration is surely worth delving into.

Keywords: climate change, climate migration, global security, refugee crisis

Procedia PDF Downloads 329
13566 Hybrid Obfuscation Technique for Reverse Engineering Problem

Authors: Asma’a Mahfoud, Abu Bakar Md. Sultan, Abdul Azim Abd, Norhayati Mohd Ali, Novia Admodisastro

Abstract:

Obfuscation is a practice to make something difficult and complicated. Programming code is ordinarily obfuscated to protect the intellectual property (IP) and prevent the attacker from reverse engineering (RE) a copyrighted software program. Obfuscation may involve encrypting some or all the code, transforming out potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels, or adding unused or meaningless code to an application binary. Obfuscation techniques were not performing effectively recently as the reversing tools are able to break the obfuscated code. We propose in this paper a hybrid obfuscation technique that contains three approaches of renaming. Experimentation was conducted to test the effectiveness of the proposed technique. The experimentation has presented a promising result, where the reversing tools were not able to read the code.

Keywords: intellectual property, obfuscation, software security, reverse engineering

Procedia PDF Downloads 136
13565 Developing Educator Cultural Awareness through Critically Reflective Professional Learning Community Collaboration

Authors: Brooke A. Moore

Abstract:

Developing teachers’ cultural awareness ensures schools are culturally responsive and socially just for diverse and exceptional students. An ideology of ‘normal’ exists in schools, creating boundaries where some students belong and others are marginalized based on difference. It is important that teacher preparation work to create democratic classrooms where teachers foster tolerance of difference and promote critical thinking and social justice. This paper outlines a framework for developing educator cultural awareness through the use of critically reflective professional learning communities (PLCs) drawing from the research on teacher critical reflection, collaborative PLCs, and Engeström’s theory of expansive learning. A case study using the framework was conducted with ten practicing teachers. Participants read and reflected on critical literature to make visible unexamined beliefs, engaged in conversations that pushed them to reflect more deeply and project forward new ideas, and set goals for acting as agents of change in their schools.

Keywords: cultural and linguistic diversity, diversity, special education, teacher beliefs

Procedia PDF Downloads 231
13564 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries

Authors: Karolin Bauer, Anna Brinkmann

Abstract:

Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.

Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster

Procedia PDF Downloads 321
13563 Flexible Cities: A Multisided Spatial Application of Tracking Livability of Urban Environment

Authors: Maria Christofi, George Plastiras, Rafaella Elia, Vaggelis Tsiourtis, Theocharis Theocharides, Miltiadis Katsaros

Abstract:

The rapidly expanding urban areas of the world constitute a challenge of how we need to make the transition to "the next urbanization", which will be defined by new analytical tools and new sources of data. This paper is about the production of a spatial application, the ‘FUMapp’, where space and its initiative will be available literally, in meters, but also abstractly, at a sensed level. While existing spatial applications typically focus on illustrations of the urban infrastructure, the suggested application goes beyond the existing: It investigates how our environment's perception adapts to the alterations of the built environment through a dataset construction of biophysical measurements (eye-tracking, heart beating), and physical metrics (spatial characteristics, size of stimuli, rhythm of mobility). It explores the intersections between architecture, cognition, and computing where future design can be improved and identifies the flexibility and livability of the ‘available space’ of specific examined urban paths.

Keywords: biophysical data, flexibility of urban, livability, next urbanization, spatial application

Procedia PDF Downloads 124
13562 Optimization Financial Technology through E-Money PayTren Application: Reducing Poverty in Indonesia with a System Direct Sales Tiered Sharia

Authors: Erwanda Nuryahya, Aas Nurasyiah, Sri Yayu Ninglasari

Abstract:

Indonesia is the fourth most populous country that still has many troubles in its development. One of the problems which is very important and unresolved is poverty. Limited job opportunity is one unresolved cause of it until today. The purpose of making this scientific paper is to know benefits of E-Money Paytren Application to enhance its partners’ income, owned by company Veritra Sentosa International. The methodology used here is the quantitative and qualitative descriptive method by case study approach. The data used are primary and secondary data. The primary data is obtained from interviews and observation to company Veritra Sentosa International and the distribution of 400 questionnaires to Paytren partner. Secondary data is obtained from the literature study and documentary. The result is that the Paytren with a system direct sales tiered syariah proven able to enhance its partners’ income. Therefore, the Optimization Financial Technology through E-Money Paytren Application should be utilized by Indonesians because it is proven that it is able to increase the income of the partners. Therefore, Paytren Application is very useful for the government, the sharia financial industry, and society in reducing poverty in Indonesia.

Keywords: e-money PayTren application, financial technology, poverty, direct sales tiered Sharia

Procedia PDF Downloads 125
13561 A Critical Genre Analysis of Negative Parts in CSR Reports

Authors: Shuai Liu

Abstract:

In corporate social responsibility (CSR) reporting, companies are expected to present both the positive and negative parts of the social and environmental impacts of their performance. This study investigates how the companies that listed in fortune 500 respond to this challenge by analyzing the representations of negative part especially the safety performance. It has found that in the level of genre analysis, it presented 3 major moves and 11 steps in terms of the interdiscursivity analysis. It was made up of three dominant discourse.. The study calls for greater focus on the internal and external analysis of the negative aspect of aspects of companies’ self-disclosure.

Keywords: CSR reports, negative parts, critical genre analysis, interdiscursivity

Procedia PDF Downloads 400
13560 Surgical Applied Anatomy: Alive and Kicking

Authors: Jake Hindmarch, Edward Farley, Norman Eizenberg, Mark Midwinter

Abstract:

There is a need to bring the anatomical knowledge of medical students up to the standards required by surgical specialties. Contention exists amongst anatomists, clinicians, and surgeons about the standard of anatomical knowledge medical students need. The aim of this study was to explore the standards which the Royal Australasian College of Surgeons are applying knowledge of anatomy. Furthermore, to align medical school teaching to what the surgical profession requires from graduates.: The 2018 volume of the ANZ Journal of Surgery was narrowed down to 254 articles by applying the search term “Anatomy”. The main topic was then extracted from each paper. The content of the paper was assessed for ‘novel description’ or ‘application’ of anatomical knowledge’ and classified accordingly. The majority of papers with an anatomical focus was from the general surgery specialty, which focused on surgical techniques, outcomes and management. Vascular surgery had the highest percentage of papers with a novel description and application of anatomy. Cardiothoracic and paediatric surgery had no papers with a novel description of anatomy. Finally, a novel application of anatomy was the main focus of each speciality. Firstly, a high proportion of novel applications and descriptions of anatomy are in general surgery. Secondly, vascular surgery had the largest proportion of novel application and description of anatomy, namely due to the rise of therapeutic imaging and endovascular techniques. Finally, all disciplines demonstrated a trend towards having a higher proportion of novel application of anatomical knowledge

Keywords: anatomical knowledge, anatomy, surgery, novel anatomy

Procedia PDF Downloads 99
13559 Knowledge and Use of Computer Application Packages by Office Managers/Secretaries in Higher Institutions in Ogun State Nigeria: Implication on Performance Enhancement

Authors: Charlotte Bose Iro-Idoro, Adebisi Folake Osore, Tajudeen Adisa Jimoh

Abstract:

All changes in the office environment were and are still driven by advances in technology. The impact of computers on office work has resulted in numerous changes in office activities, procedures and the expectations from office managers and secretaries. This study investigated the level of knowledge and use of computer office application packages by secretaries and office managers in higher educational institutions in Ogun State and the implications of these on their performance enhancement. The study is an ex post facto research and adopted the survey design for the collection of data. Two hypotheses were formulated, and a questionnaire was developed and tested at 0.05 level of significance. All office managers and secretaries in the service of higher educational institutions in Ogun State, Nigeria formed the population of the study. The study was limited to federal institutions and a total of 120 office managers/secretaries were selected to form the sample such that 40 office managers/secretaries were randomly selected from each of the three Federal higher institutions in the State, that is Federal University of Agriculture, Abeokuta, Federal Polytechnic, Ilaro and Federal College of Education, Osiele, Abeokuta, Ogun State. Analysis of data and hypotheses tests were carried out with frequency counts, percentage and T-Test. The result indicated varying levels of awareness on office application tools with limited knowledge and use of computer application packages by office managers/secretaries. The results also showed that good knowledge and high use of office application tools enhance performance of office managers/secretaries. The study recommended that there should be maximum institutional resources and support and personal development on the part of the office managers to ensure update knowledge and maximal use of office application tools by office managers/secretaries.

Keywords: application packages, computer, office managers, performance enhancement

Procedia PDF Downloads 154
13558 Study of Components and Effective Factors on Organizational Commitment of Khoramabad Branchs Islamic Azad University’s Faculty Members

Authors: Mehry Daraei

Abstract:

The goal of this study was to survey the components and affective factors on organizational commitment of Islamic Azad university Khoramabad Baranch’s faculty members. The research method was correlation by causal modeling and data were gathered by questionnaire. Statistical society consisted of 147 faculty members in Islamic Azad University Khoramabad Branch and sample size was determined as 106 persons by Morgan’s sample table that were selected by class sampling. Correlation test, T-single group test and path analysis test were used for analysis of data. Data were analyzed by Lisrel software. The results showed that organizational corporate was the most effective element on organizational commitment and organizational corporate, experience work and organizational justice were only in direct relation with organizational commitment. Also, job security had direct and indirect effect on OC. Job security had effect on OC by gender. Gender variable had direct and indirect effect on OC. Gender had effect on OC by organizational corporate. Job opportunities out of university also had direct and indirect effect on OC, which means job opportunities had indirect effect on OC by organizational corporate.

Keywords: organization, commitment, job security, Islamic Azad University

Procedia PDF Downloads 304
13557 Secure Transfer of Medical Images Using Hybrid Encryption

Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 425
13556 The Effect of Recycling on Price Volatility of Critical Metals in the EU (2010-2019): An Application of Multivariate GARCH Family Models

Authors: Marc Evenst Jn Jacques, Sophie Bernard

Abstract:

Electrical and electronic applications, as well as rechargeable batteries, are common in any economy. They also contain a number of important and valuable metals. It is critical to investigate the impact of these new materials or volume sources on the metal market dynamics. This paper investigates the impact of responsible recycling within the European region on metal price volatility. As far as we know, no empirical studies have been conducted to assess the role of metal recycling in metal market price volatility. The goal of this paper is to test the claim that metal recycling helps to cushion price volatility. A set of circular economy indicators/variables, namely, 1) annual total trade values of recycled metals, 2) annual volume of scrap traded and 3) circular material use rate, and 4) information about recycling, are used to estimate the volatility of monthly spot prices of regular metals. A combination of the GARCH-MIDAS model for mixed frequency data sampling and a simple GARCH (1,1) model for the same frequency variables was adopted to examine the potential links between each variable and price volatility. We discovered that from 2010 to 2019, except for Nickel, scrap consumption (Millions of tons), Scrap Trade Values, and Recycled Material use rate had no significant impact on the price volatility of standard metals (Aluminum, Lead) and precious metals (Gold and Platinum). Worldwide interest in recycling has no impact on returns or volatility. Specific interest in metal recycling did have a link to the mean return equation for Aluminum, Gold and to the volatility equation for lead and Nickel.

Keywords: recycling, circular economy, price volatility, GARCH, mixed data sampling

Procedia PDF Downloads 40
13555 Exploring the Governmentality of Practice in Communication Education in Ghana

Authors: Wincharles Coker

Abstract:

This study troubles the role the state as the chief sponsor of higher education plays in shaping communication training in Ghana. Using a public university as a case study, it explores how the government of Ghana, through its regimes of control, exercises its authority over the means of production in the academy. Based on Wenger’s community of practice theory and critical theory, the research analyzes the political economy within which higher education in the country operates, focusing on the mandates of two of its bodies: the National Council for Tertiary Education (NCTE) and the National Accreditation Board (NAB). Results show that communication training in Ghana is shaped by three basic strategies of control: developmentalism, bureaucratization, and corporatization. This governmentality, the research reveals nonetheless, largely constrains the agency and practices of the community of communication faculty and administrators, and thus presents a major challenge to the exercise of intellectual freedom, and the self-critical nature of the academy. The study bears implications for further research in the political economy of communication studies, the administration of higher education, and critical/cultural studies in education.

Keywords: communication, developmentalism, educattion, governmentality

Procedia PDF Downloads 342
13554 Critical Success Factors of OCOP Business Model in Pattani Province, Thailand: A Qualitative Approach

Authors: Poonsuck Thatchaopas, Nik Kamariah Nik Mat, Nattakarn Eakuru

Abstract:

“One College One Product” OCOP business model is launched by the Vocational Education Commission to encourage college students to choose at least one product for business venture. However, the number of successful OCOP projects is still minimal. The objective of this paper is to identify the critical success factors needed to be a successful OCOP business entrepreneur. This study uses qualitative method by interviewing business partners of an OCOP business called Crispy Roti Krua Acheeva Brand (CRKAB). This project was initiated by three female alumni students of the CRKAB. The finding shows that the main critical success factors are self-confidence, creativity or innovativeness, knowledge, skills and perseverance. Additionally, they reiterated that the keys to business success are product quality, perceived price, promotion, branding, new packaging to increase sales and continuous developments. The results implies for a business SME to be successful, the company should have credible partners and effective marketing plan.

Keywords: new entrepreneurship student model, business incubator, food industry, Pattani Province, Thailand

Procedia PDF Downloads 364
13553 Impact of Global Climate Change on Economy of Pakistan: How to Ensure Sustainable Food and Energy Production

Authors: Sabahat Zahra

Abstract:

The purpose of this research is to present the changing global environment and its potential impacts on sustainable food and energy production at global level, particularly in Pakistan. The food and energy related-economic sector has been subjected to negative consequences due to recent extreme changes in weather conditions, particularly in developing countries. Besides continuous modifications in weather, population is also increasing by time, therefore it is necessary to take special steps and start effective initiatives to cope with the challenges of food and energy security to fight hunger and for economic stability of country. Severe increase in temperature and heat waves has also negative impacts on food production as well as energy sustainability. Energy (in terms of electricity) consumption has grown up than the production potential of the country as a consequence of increasing warm weather. Ultimately prices gone up when there is more consumption than production. Therefore, all these aspects of climate change are interrelated with socio-economic issues. There is a need to develop long-term policies on regional and national levels for maintainable economic growth. This research presents a framework-plan and recommendations for implementation needed to mitigate the potential threats due to global climate change sustainable food and energy production under climate change in the country.

Keywords: climate changes, energy security, food security, global climate change

Procedia PDF Downloads 332
13552 Northern Ghana’s Sustainable Food Systems: Evaluating the Impact of International Development

Authors: Maxwell Ladogo Abilla

Abstract:

As evidence from the 2007–2008 and 2010 global food and financial crises revealed that food systems were under stress, the idea of sustainable food systems rose to prominence in the discussion of food security. The idea suggests moving away from a conception of food security that emphasizes production in favor of one that is more socially and environmentally conscious and interested in tackling a wide range of issues that have rendered the food system dysfunctional. This study evaluates the efforts made by international development organizations to increase food security in the area, taking into account the persistence of poverty and food insecurity in northern Ghana, utilizing the idea of sustainable food systems as the evaluation criterion. The study used triangulation to address the research questions by combining qualitative interview data with documentary analysis. To better comprehend the concept of sustainability, a variety of discourses and concepts are used, which results in the development of eight doable objectives for attaining sustainable food systems. The study finds that the food system in northern Ghana is unsustainable because of three kinds of barriers, with the practical objectives of developing sustainable food systems serving as the assessment criteria (natural, cultural and economic, and institutional). According to an evaluation of the World Food Programme's development support in northern Ghana, regional challenges to attaining sustainable food systems continue to be unaddressed by global development initiatives. Due to institutional constraints, WFP's interventions fell short of their promise. By demonstrating the need for development partners to enhance institutional efficiency and coordination, enable marginalized communities to access their rights, and prioritize agricultural irrigation in the area, the study makes a contribution to development policy and practice in northern Ghana.

Keywords: sustainable, food security, development, institutional

Procedia PDF Downloads 75
13551 Advanced Electric Motor Design Using Hollow Conductors for Maximizing Power, Density and Degree of Efficiency

Authors: Michael Naderer, Manuel Hartong, Raad Al-Kinani

Abstract:

The use of hollow conductors is known in electric generators of large MW scale. The application of motors of small scale between 50 and 200kW is new. The latest results in the practical application and set up of machines show that the power density can be raised significantly and the common problem of derating of the motors is prevented. Furthermore, new design dimensions can be realised as continuous current densities up to 75A/mm² are achievable. This paper shows the results of the application of hollow conductors for a motor design used for automotive traction machines comparing common coolings with hollow conductor cooling.

Keywords: degree of efficiency, electric motor design, hollow conductors, power density

Procedia PDF Downloads 181
13550 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 484